Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Intellectual Property Law

Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy Jun 2016

Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy

Canadian Journal of Law and Technology

In this paper, the authors explore strategies for balancing privacy with transparency in the release of government data and information as part of the growing global open government movement. The issue is important because government data or information may take many forms, may contain many different types of personal information, and may be released in a range of contexts. The legal framework is complex: personal information is typically not released as open data or under access to information regimes; nevertheless, in some cases transparency requirements take precedence over the protection of personal information. The open courts principle, for example, places …


Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie Jun 2016

Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie

Canadian Journal of Law and Technology

Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry.

Using a pending border case …


Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma Jun 2016

Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma

Canadian Journal of Law and Technology

2014’s U.S. Supreme Court decision Aereo made waves in the entertainment and technology industry when it ruled in favour of a coterie of cable companies against an upstart start-up, Aereo Inc., retransmitting broadcast television over the internet. Little attention, however, has been paid to its ramifications to the Canadian broadcasting regime, with its vastly different regulatory scheme and an underlying objective to promote the dissemination of Canadian content. Complicating matters further is the 2012 Canadian Supreme Court decision Cogeco, where the retransmission of broadcast signals had been re-articulated as a ’user right’. This paper uses the Aereo decision as a …


Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram Jun 2016

Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …


The Right To Repair Doctrine And The Use Of 3d Printing Technology In Canadian Patent Law, Tesh W. Dagne, Gosia Piasecka Jun 2016

The Right To Repair Doctrine And The Use Of 3d Printing Technology In Canadian Patent Law, Tesh W. Dagne, Gosia Piasecka

Canadian Journal of Law and Technology

3D printing technology is part of a new economic movement, termed the sharing economy, where consumers rely less on large corporations for supplying them with products. The technology allows consumers to bypass the traditional manufacturing process. Instead, consumers increasingly share and sell products to each other on online sharing platforms. Consumers can download digital copies of products and print them in the convenience of their homes. In addition, they can repair and modify these products to suit their needs. Canadian patent law permits the repair of a patent-protected item but prohibits its reconstruction. However, the line between repair and reconstruction …


The Road To Artificial Super-Intelligence: Has International Law A Role To Play?, J.-G. Castel, Matthew E. Castel Jan 2016

The Road To Artificial Super-Intelligence: Has International Law A Role To Play?, J.-G. Castel, Matthew E. Castel

Canadian Journal of Law and Technology

Part I of this article deals with the road to artificial general super-intelligence.

Part II addresses the controls, if any, that should be exercised over the production and use of partially or fully autonomous machines of artificial intelligence before and after they become super-intelligent. More particularly, should there be legal and ethical limits to their use and to what extent should international law play a role in this connection?


Un Nouveau Code Pour Une Procédure Technologique: Mémento Pour Le Pr@Ticien, Antoine Guilman Jan 2016

Un Nouveau Code Pour Une Procédure Technologique: Mémento Pour Le Pr@Ticien, Antoine Guilman

Canadian Journal of Law and Technology

Table des matières

Introduction.................................................................................................. 18

I. La transmission technologique des actes de procédure ................................. 22

(a) Le dépôt technologique des actes de procédure ................................... 23

(i) Un régime légal inédit : les dispositions du NCPC...................... 23

(ii) Un régime réglementaire inexistant : l’exemple de la Cour fédérale ...................................................................................... 26

(b) La signification technologique des actes de procédure ......................... 28

(i) Le principe : la signification de main à main .............................. 29

(ii) L’exception : la signification technologique................................. 30

(c) La notification technologique des actes de procédure..........................35

(i) La notification par un moyen technologique .............................. 35

(ii) La notification par …


Les Photos Prises Par Les Téléphones Cellulaires Sont-Elles Assez « Originales » Pour Être Protégées Par La Loi Sur Le Droit D'Auteur?, René Pépin Jan 2016

Les Photos Prises Par Les Téléphones Cellulaires Sont-Elles Assez « Originales » Pour Être Protégées Par La Loi Sur Le Droit D'Auteur?, René Pépin

Canadian Journal of Law and Technology

On considérait traditionnellement que l’originalité réside dans les choix faits par le photographe au niveau de la sensibilité du film choisi, de la vitesse de l’obturateur, de la mise au foyer, de la pose du sujet photographié , etc. Mais les caméras incorporées dans les téléphones cellulaires sont si perfectionnées que la prise de photo se fait de façon presque automatique. L’appareil fait seul la mise au foyer, le flash se déclenche au besoin, la vitesse d’obturation est optimale, le cadrage se fait presque seul, etc. C’est justement le grand avantage et le grand attrait de ces appareils. L’utilisateur n’a …


Is There A 'Right To Be Forgotten' In Canada's Personal Information Protection And Electronic Documents Act (Pipeda)?, Michael Rosenstock Jan 2016

Is There A 'Right To Be Forgotten' In Canada's Personal Information Protection And Electronic Documents Act (Pipeda)?, Michael Rosenstock

Canadian Journal of Law and Technology

In this paper, I argue that PIPEDA could support a version of the right to be forgotten, subject to three important caveats. First, for search engines to meet the threshold applicability test under PIPEDA, their activities (i.e., crawling, indexing, organizing, etc.) must constitute the ‘‘collection, use or disclosure” of personal information. Ascribing such a role to search engines in information dissemination would likely require a court to distinguish the activities of search engines from hyperlinks on websites, which the Supreme Court in Crookes v. Newton determined did not involve control over content. Second, PIPEDA’s ‘‘all-or-nothing approach” means that if search …


Minding The Gap: Why Or How Nova Scotia Should Enact A New Cyber-Safety Act - Case Comment On Crouch V. Snell, Jennifer Taylor Jan 2016

Minding The Gap: Why Or How Nova Scotia Should Enact A New Cyber-Safety Act - Case Comment On Crouch V. Snell, Jennifer Taylor

Canadian Journal of Law and Technology

Nova Scotia’s Cyber-safety Act was meant to fill a gap in the law. Where criminal charges and civil claims like defamation were unavailable or undesirable, the Act, it was hoped, would contain a substantive definition of cyberbullying, set out when it was actionable, and provide procedures for victims to obtain remedies. But the statute that was ultimately passed was too blunt a tool to address the problem, from both a substantive and a procedural perspective.

That helps explain why Justice McDougall of the Supreme Court of Nova Scotia struck down the entire statute as unconstitutional, in the recent case of …


Protecting The Privacy Of Canadians' Health Information In The Cloud, Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S. Dove, Yann Joly Jan 2016

Protecting The Privacy Of Canadians' Health Information In The Cloud, Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S. Dove, Yann Joly

Canadian Journal of Law and Technology

This article presents results from a year-long research project reviewing health privacy issues in the cloud, funded by the Contributions Program of the Office of the Privacy Commissioner of Canada (OPC). Section I provides a brief primer on cloud computing and its applications in data-centric health research and health care. Section II reviews Canadian privacy and health privacy laws and how they apply to CSPs. Section III identifies privacy risks arising from the technological, organizational, and jurisdictional complexity of cloud computing. Section IV argues that Canadian health privacy laws fail to address difficulties custodians face in balancing responsibilities with CSPs, …


Flying Robots And Privacy In Canada, Paul D.M. Holden Jan 2016

Flying Robots And Privacy In Canada, Paul D.M. Holden

Canadian Journal of Law and Technology

Drones have been a hot topic in recent years particularly when used in war and in domestic police operations. Drones have also attracted attention because of highprofile plans to use them for package delivery, among other things. While the glamourous and future uses of drones catch media attention, drones are already being used in the private sector for more mundane purposes including surveying, infrastructure inspection and real estate sales promotion. While the privacy threats of military and police drones are widely discussed, privacy concerns of private drones have attracted much less consideration.

This paper looks at the privacy risks of …


Book Review: Jonathan Clough, Principles Of Cybercrime, 2nd Ed (Cambridge: Cambridge University Press, 2015), Christopher D. Ram Jan 2016

Book Review: Jonathan Clough, Principles Of Cybercrime, 2nd Ed (Cambridge: Cambridge University Press, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

The past decade has seen an enormous explosion of scholarship on the subject of cybercrime, as technologies and offenders pose new challenges and law enforcement, government and academic experts struggle to keep up. The new, second edition of Professor Jonathan Clough’s book occupies a fairly substantial, but specific niche in this increasingly diverse and complex landscape. Principles of Cybercrime contains only a cursory review of the history and criminology of cybercrime, it does not deal at all with IT security, investigative or enforcement matters, and discussion of cybercrime as a global issue is limited to brief discussions of the 2001 …